forked from Minki/linux
4ca165fc6c
Using smk_of_current() during sk_alloc_security hook leads in rare cases to a faulty initialization of the security context of the created socket. By adding the LSM hook sk_clone_security to SMACK this initialization fault is corrected by copying the security context of the old socket pointer to the newly cloned one. Co-authored-by: Martin Ostertag: <martin.ostertag@elektrobit.com> Signed-off-by: Lontke Michael <michael.lontke@elektrobit.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> |
||
---|---|---|
.. | ||
Kconfig | ||
Makefile | ||
smack_access.c | ||
smack_lsm.c | ||
smack_netfilter.c | ||
smack.h | ||
smackfs.c |